File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Some attacks on quantum-based cryptographic protocols

TitleSome attacks on quantum-based cryptographic protocols
Authors
KeywordsQuantum Key Distribution
Unconditional Security
Quantum Cryptography
Issue Date2005
Citation
Quantum Information and Computation, 2005, v. 5, n. 1, p. 41-48 How to Cite?
AbstractQuantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we give attacks against a recently proposed "secure communication using mesoscopic coherent states", which employs mesoscopic states, rather than single-photon states. Our attacks can be used either as a known-plaintext attack or in the case where the plaintext has not been randomized. One of our attacks requires beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2k copies of what Bob receives, where k is the length of the seed key pre-shared by Alice and Bob. In addition, substantial improvements over such an exhaustive key search attack can be made, whenever a key is reused. Furthermore, we remark that, under the same assumption of a known or non-random plaintext, Grover's exhaustive key search attack can be applied directly to "secure communication using mesoscopic coherent states", whenever the channel loss is more than 50 percent. Therefore, as far as information-theoretic security is concerned, optically amplified signals necessarily degrade the security of the proposed scheme, when the plaintext is known or non-random. Our attacks apply even if the mesoscopic scheme is used only for key generation with a subsequent use of the key for one-time-pad encryption. Studying those attacks can help us to better define the risk models and parameter spaces in which quantum-based cryptographic schemes can operate securely. Finally, we remark that our attacks do not affect standard protocols such as Bennett-Brassard BB84 protocol or Bennett B92 protocol, which rely on single-photon signals. © Rinton Press.
Persistent Identifierhttp://hdl.handle.net/10722/285585
ISSN
2021 Impact Factor: 1.069
2020 SCImago Journal Rankings: 0.504
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorLo, Hoi-Kwong-
dc.contributor.authorKo, Tsz-Mei-
dc.date.accessioned2020-08-18T04:56:07Z-
dc.date.available2020-08-18T04:56:07Z-
dc.date.issued2005-
dc.identifier.citationQuantum Information and Computation, 2005, v. 5, n. 1, p. 41-48-
dc.identifier.issn1533-7146-
dc.identifier.urihttp://hdl.handle.net/10722/285585-
dc.description.abstractQuantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we give attacks against a recently proposed "secure communication using mesoscopic coherent states", which employs mesoscopic states, rather than single-photon states. Our attacks can be used either as a known-plaintext attack or in the case where the plaintext has not been randomized. One of our attacks requires beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2k copies of what Bob receives, where k is the length of the seed key pre-shared by Alice and Bob. In addition, substantial improvements over such an exhaustive key search attack can be made, whenever a key is reused. Furthermore, we remark that, under the same assumption of a known or non-random plaintext, Grover's exhaustive key search attack can be applied directly to "secure communication using mesoscopic coherent states", whenever the channel loss is more than 50 percent. Therefore, as far as information-theoretic security is concerned, optically amplified signals necessarily degrade the security of the proposed scheme, when the plaintext is known or non-random. Our attacks apply even if the mesoscopic scheme is used only for key generation with a subsequent use of the key for one-time-pad encryption. Studying those attacks can help us to better define the risk models and parameter spaces in which quantum-based cryptographic schemes can operate securely. Finally, we remark that our attacks do not affect standard protocols such as Bennett-Brassard BB84 protocol or Bennett B92 protocol, which rely on single-photon signals. © Rinton Press.-
dc.languageeng-
dc.relation.ispartofQuantum Information and Computation-
dc.subjectQuantum Key Distribution-
dc.subjectUnconditional Security-
dc.subjectQuantum Cryptography-
dc.titleSome attacks on quantum-based cryptographic protocols-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-14844328078-
dc.identifier.volume5-
dc.identifier.issue1-
dc.identifier.spage41-
dc.identifier.epage48-
dc.identifier.isiWOS:000228015900004-
dc.identifier.partofdoi10.26421/QIC5.1-
dc.identifier.issnl1533-7146-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats